Identification using encrypted biometrics

Mohammad Haghighat, Saman Zonouz, Mohamed Abdel-Mottaleb

Research output: Chapter in Book/Report/Conference proceedingConference contribution

76 Citations (Scopus)

Abstract

Biometric identification is a challenging subject among computer vision scientists. The idea of substituting biometrics for passwords has become more attractive after powerful identification algorithms have emerged. However, in this regard, the confidentiality of the biometric data becomes of a serious concern. Biometric data needs to be securely stored and processed to guarantee that the user privacy and confidentiality is preserved. In this paper, a method for biometric identification using encrypted biometrics is presented, where a method of search over encrypted data is applied to manage the identification. Our experiments of facial identification demonstrate the effective performance of the system with a proven zero information leakage.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages440-448
Number of pages9
Volume8048 LNCS
EditionPART 2
DOIs
StatePublished - Sep 26 2013
Event15th International Conference on Computer Analysis of Images and Patterns, CAIP 2013 - York, United Kingdom
Duration: Aug 27 2013Aug 29 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume8048 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other15th International Conference on Computer Analysis of Images and Patterns, CAIP 2013
CountryUnited Kingdom
CityYork
Period8/27/138/29/13

Fingerprint

Biometrics
Confidentiality
Password
Leakage
Computer Vision
Computer vision
Privacy
Zero
Demonstrate
Experiment
Experiments

Keywords

  • encrypted biometrics
  • face recognition
  • search over encrypted data

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2013). Identification using encrypted biometrics. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (PART 2 ed., Vol. 8048 LNCS, pp. 440-448). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8048 LNCS, No. PART 2). https://doi.org/10.1007/978-3-642-40246-3_55

Identification using encrypted biometrics. / Haghighat, Mohammad; Zonouz, Saman; Abdel-Mottaleb, Mohamed.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8048 LNCS PART 2. ed. 2013. p. 440-448 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8048 LNCS, No. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Haghighat, M, Zonouz, S & Abdel-Mottaleb, M 2013, Identification using encrypted biometrics. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 edn, vol. 8048 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), no. PART 2, vol. 8048 LNCS, pp. 440-448, 15th International Conference on Computer Analysis of Images and Patterns, CAIP 2013, York, United Kingdom, 8/27/13. https://doi.org/10.1007/978-3-642-40246-3_55
Haghighat M, Zonouz S, Abdel-Mottaleb M. Identification using encrypted biometrics. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 8048 LNCS. 2013. p. 440-448. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 2). https://doi.org/10.1007/978-3-642-40246-3_55
Haghighat, Mohammad ; Zonouz, Saman ; Abdel-Mottaleb, Mohamed. / Identification using encrypted biometrics. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8048 LNCS PART 2. ed. 2013. pp. 440-448 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 2).
@inproceedings{7a626cd78dfa47968ba23ac2227d26f9,
title = "Identification using encrypted biometrics",
abstract = "Biometric identification is a challenging subject among computer vision scientists. The idea of substituting biometrics for passwords has become more attractive after powerful identification algorithms have emerged. However, in this regard, the confidentiality of the biometric data becomes of a serious concern. Biometric data needs to be securely stored and processed to guarantee that the user privacy and confidentiality is preserved. In this paper, a method for biometric identification using encrypted biometrics is presented, where a method of search over encrypted data is applied to manage the identification. Our experiments of facial identification demonstrate the effective performance of the system with a proven zero information leakage.",
keywords = "encrypted biometrics, face recognition, search over encrypted data",
author = "Mohammad Haghighat and Saman Zonouz and Mohamed Abdel-Mottaleb",
year = "2013",
month = "9",
day = "26",
doi = "10.1007/978-3-642-40246-3_55",
language = "English",
isbn = "9783642402456",
volume = "8048 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 2",
pages = "440--448",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
edition = "PART 2",

}

TY - GEN

T1 - Identification using encrypted biometrics

AU - Haghighat, Mohammad

AU - Zonouz, Saman

AU - Abdel-Mottaleb, Mohamed

PY - 2013/9/26

Y1 - 2013/9/26

N2 - Biometric identification is a challenging subject among computer vision scientists. The idea of substituting biometrics for passwords has become more attractive after powerful identification algorithms have emerged. However, in this regard, the confidentiality of the biometric data becomes of a serious concern. Biometric data needs to be securely stored and processed to guarantee that the user privacy and confidentiality is preserved. In this paper, a method for biometric identification using encrypted biometrics is presented, where a method of search over encrypted data is applied to manage the identification. Our experiments of facial identification demonstrate the effective performance of the system with a proven zero information leakage.

AB - Biometric identification is a challenging subject among computer vision scientists. The idea of substituting biometrics for passwords has become more attractive after powerful identification algorithms have emerged. However, in this regard, the confidentiality of the biometric data becomes of a serious concern. Biometric data needs to be securely stored and processed to guarantee that the user privacy and confidentiality is preserved. In this paper, a method for biometric identification using encrypted biometrics is presented, where a method of search over encrypted data is applied to manage the identification. Our experiments of facial identification demonstrate the effective performance of the system with a proven zero information leakage.

KW - encrypted biometrics

KW - face recognition

KW - search over encrypted data

UR - http://www.scopus.com/inward/record.url?scp=84884494064&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84884494064&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-40246-3_55

DO - 10.1007/978-3-642-40246-3_55

M3 - Conference contribution

SN - 9783642402456

VL - 8048 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 440

EP - 448

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -